Sciweavers

1665 search results - page 290 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
COOPIS
2003
IEEE
15 years 3 months ago
Ontology Based Query Processing in Database Management Systems
The use of semantic knowledge in its various forms has become an important aspect in managing data in database and information systems. In the form of integrity constraints, it ha...
Chokri Ben Necib, Johann Christoph Freytag
EPIA
2003
Springer
15 years 3 months ago
Adaptation to Drifting Concepts
Most of supervised learning algorithms assume the stability of the target concept over time. Nevertheless in many real-user modeling systems, where the data is collected over an ex...
Gladys Castillo, João Gama, Pedro Medas
P2P
2010
IEEE
127views Communications» more  P2P 2010»
14 years 7 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
SRDS
1993
IEEE
15 years 1 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
15 years 2 months ago
Resource allocation for signal detection with active sensors
— We consider the problem of determining the existence of known constant signals over a set of sites, given noisy measurements obtained by a team of active sensors that can switc...
Jerome Le Ny, Michael M. Zavlanos, George J. Pappa...